Design of an efficient graph-based traversing method for establishing authentication mechanism in cloud

Author:

Nagesh Puvvada1ORCID,Srinivasu N.1

Affiliation:

1. Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur 522002, Andhra Pradesh, India

Abstract

With the broader development of networking, data acquired from IoT and big data have grown significantly in various real-time applications. It provides a transparent role of human life as it shows an extensive bond with data provisioning. On the other hand, it has some challenging issues like verification of authenticity of the enormous data over an un-trusted environment like cloud. It causes privacy leakage, delay, and unidentified data size by third-party. Thus, there is a need for a novel authentication to handle all these problems using a tree data structure for establishing authentication for privacy preservation. Here, a novel graph-based traversing algorithm (GTA) is proposed for realizing the data stream verification and validates the arrival of data streams. This model reduces the failure rate and improves the authentication mechanism and robustness. An integrity verification scheme is used to handle privacy leakage issues during third-party analysis. The simulation is performed in MATLAB 2016b environment to project the significance of the model, and the outcomes are more desirable for authentication and privacy preservation during practical examination. Here, metrics like path length, total verification time, and total insertion time are evaluated. The proposed model gives a better trade-off compared to existing approaches. The path length variation of GTA is 1.3, 1.4, and 1.5 for depth rates 6, 8, and 10, respectively. The total verification time with data size is 1, 2, 3, and 4[Formula: see text]GB, respectively. The total insertion time of GTA is 5, 10, 15, and 18[Formula: see text]s for 1, 2, 3, and 4[Formula: see text]GB, respectively. It is remarkably lesser than P-ATHAT and Merkle tree, respectively. The time needed for two successive data verification is 16, 23, 43, and 57[Formula: see text]s for data sizes of 1, 2, 3, and 4[Formula: see text]GB, respectively. The proposed model consumes 15, 28, 44, and 54[Formula: see text]s, respectively, for the data size from 1[Formula: see text]GB to 4[Formula: see text]GB.

Publisher

World Scientific Pub Co Pte Ltd

Subject

Computer Science Applications,Modeling and Simulation,General Engineering,General Mathematics

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3